We use cookies to ensure that we give you the best experience on our website. If you continue without changing your browser settings we will assume that you are happy to receive all cookies on the Tech Data website. However, if you would like to, you can change the cookie settings of your browser at any time. To find out more about the cookies, see our Privacy Policy and Cookie Statement.

Securing Windows Server 2016 (180 Day) - On Demand (ODX20744B)

This five-day, instructor-led course teaches IT professionals how they can enhance the security of the IT infrastructure that they administer. This course begins by emphasizing the importance of assuming that network breaches have occurred already, and then teaches you how to protect administrative credentials and rights to help ensure that administrators can perform only the tasks that they need to, when they need to.This course explains how you can use auditing and the Advanced Threat Analysis feature in Windows Server 2016 to identify security issues. You will also learn how to mitigate malware threats, secure your virtualization platform, and use deployment options such as Nano server and containers to enhance security. The course also explains how you can help protect access to files by using encryption and dynamic access control, and how you can enhance your network’s security.

Microsoft On DemandMicrosoft Official Courses On-Demand (MOC On-Demand) blend video, text, hands-on labs and knowledge checks to help you build your Microsoft technology skills on your own schedule, at your own pace and in your own place. No need to spend time and money travelling to a classroom location or adhering to classroom hours with a computer and an Internet connection, your Microsoft Official Courses On-Demand come to you, any time.

Microsoft On Demand covers the same objectives as the classroom course by the same name

After you activate your course, you have 6 months to complete it. You can work on your course at any time throughout the 6-month period after you activate the course.

PrerequisitesStudents should have at least two years of experience in the IT field and should have:

Completed courses 740, 741, and 742, or the equivalent.

A solid, practical understanding of networking fundamentals, including TCP/IP, User Datagram Protocol (UDP), and Domain Name System (DNS).

Module 1: Attacks, breach detection, and Sysinternals toolsIn this module, students will learn about breach detection, attack types and vectors, cybercrime, and how you can analyse your system’s activity by using the Sysinternals tool suite.Lessons

Understanding attacks

Detecting breaches

Examining activity with the Sysinternals tool

Module 2: Protecting credentials and privileged accessThis module explains how you can configure user rights and security options, protect credentials by using credential guard, implement privileged-access workstations, and manage and deploy a local administrator-password solution so that you can manage passwords for local administrator accounts.Lessons

Understanding user rights

Computer and service accounts

Protecting credentials

Privileged-Access Workstations and jump servers

Local administrator-password solution

Module 3: Limiting administrator rights with Just Enough AdministrationThis module explains how to deploy and configure Just Enough Administration (JEA).Lessons

Module 7: Deploying and configuring Advanced Threat Analytics and Microsoft Operations Management SuiteThis module explains the Microsoft Advanced Threat Analytics tool and the Microsoft Operations Management suite (OMS), and details how you can use them to monitor and analyse the security of a Windows Server deployment.Lessons

Module 9: Securing application development and server-workload infrastructureThis module details the Security Compliance Manager, including how you can use it to configure, manage, and deploy baselines. Additionally, students will learn how to deploy and configure Nano Server, Microsoft Hyper-V, and Windows Server Containers.Lessons

Module 11: Optimizing and securing file servicesThis module explains how to optimize file services by configuring File Server Resource Manager (FSRM) and Distributed File System (DFS). Students will learn how to protect a device’s data by using encryption or BitLocker. Students also will learn how to manage access to shared files by configuring Dynamic Access Control (DAC).Lessons

File Server Resource Manager

Implementing classification management and file-management tasks

Dynamic Access Control

Module 12: Securing network traffic with firewalls and encryptionThis module explains the firewalls that are present on Windows Server.Lessons